Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1501
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article -
1502
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
Published 2019-04-01“…Thus, the proposed scheme is more desirable for securing communication in mobile networks.…”
Get full text
Article -
1503
RNA Biopesticides: A Cutting‐Edge Approach to Combatting Aquaculture Diseases and Ensuring Food Security
Published 2024-12-01“…With high specificity and minimal environmental impact, RNA biopesticides provide an innovative, sustainable approach to combating diseases in aquaculture, enhancing both food security and environmental safety.…”
Get full text
Article -
1504
-
1505
Impacts of Climate Change on Water Resources, Agricultural Production and Food Security: Evidence from Turkiye
Published 2023-01-01Subjects: Get full text
Article -
1506
On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys
Published 2014-01-01“…Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. …”
Get full text
Article -
1507
Principle and certain nomotechnical characteristics of criminal offences against the constitutional order and security of the Republic of Serbia
Published 2024-01-01Subjects: “…constitutional order and security…”
Get full text
Article -
1508
The Role of Great Britain in Forming of EU’s Foreign and Security Policy in the Context of Leading Theories of Eurointegration
Published 2015-02-01Subjects: Get full text
Article -
1509
Food security and dietary intake of a cohort of South African students during COVID-19
Published 2025-01-01Subjects: Get full text
Article -
1510
Memahami Dinamika Kerjasama Industri Pertahanan dalam Kerangka Indonesia Australia Defence Security Dialogue
Published 2023-01-01“…Industri pertahanan menjadi salah satu agenda penting dan menjadi perhatian, dimulai pada saat kabinet Indonesia Bersatu I dibawah Presiden Susilo Bambang Yudhoyono dan menjadikannya sebagai prioritas pembangunan dan memberi peluang besar bagi keterlibatan pihak swasta dalam kegiatan industri pertahanan salah satunya melalui agenda kerja sama yang dijalin oleh Indonesia dengan Australia dalam satu agenda dialog Indonesia – Australia Defense Security Dialogue (IADSD) yang telah dijalin dan disahkan oleh Lombok Treaty pada tahun 2006, yang mana Indonesia dalam hal ini memiliki kepentingan untuk meningkatkan kapabilitas serta kemandirian Industri pertahanan nasional. …”
Get full text
Article -
1511
Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network
Published 2022-04-01“…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
Get full text
Article -
1512
Security and religion in democratizing Tunisia: re-enacting surveillance through religious narratives and gendered dynamics
Published 2024-07-01Subjects: Get full text
Article -
1513
SECURITY, POLITICS, AND THE CIRCULAR ECONOMY: A HISTORICAL STUDY OF ROMANIA’S RAILWAY EVOLUTION (1846-2007)
Published 2024-12-01Subjects: Get full text
Article -
1514
A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents
Published 2013-01-01“…It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. …”
Get full text
Article -
1515
A security detection approach based on autonomy-oriented user sensor in social recommendation network
Published 2022-03-01“…However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. …”
Get full text
Article -
1516
Assessing Structural Components of Investment and Innovation Provision of Economic Security in the Basic Types of Economic Activity
Published 2021-06-01“…The article shows the progressive and practical value of a structural approach to the evaluation of investment and innovation provision of economic security, including the basic types of economic activity. …”
Get full text
Article -
1517
Towards the Integration between IoT and Cloud Computing: An Approach for the Secure Self-Configuration of Embedded Devices
Published 2015-12-01“…The secure boot-up and setup of Internet of Things (IoT) devices connected over the Cloud represent a challenging open issue. …”
Get full text
Article -
1518
Resource allocation algorithm for secure communication in UAV-assisted D2D communication network
Published 2024-02-01Subjects: Get full text
Article -
1519
Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique
Published 2016-01-01“…The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. …”
Get full text
Article -
1520